Required: Tenable Nessus Engineers IR35 Status: Inside Duration: 12 month initial contract Location: 1-2 days onsite in either Central London or Knutsford Role 1 As an experienced Vulnerability Assessment Engineer responsible for maintaining the Vulnerability Assessment toolsets and products. Primary Responsibilities The ability to review requirements, undertake product design followed by Implementation/deployment/support of … Vulnerability Assessment tools suite (e.g Tenable, Rapid7, Qualys etc) and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerability scanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture … diagrams and system build documentation. Responsible for operating the scanning tools and maintaining coverage along with supporting the vulnerabilitymanagement and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerabilitymanagement team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents in collaboration with the security team, Defender for Endpoint security, Mimecast email security and vulnerabilitymanagement via Nessus, to name a few.Collaboration is key within this position, and you’ll regularly correspond with stakeholders, technical teams, non-technical teams and other businesses within … with occasional travel to the office on an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Security management, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the … business transitions – Covering SOC duties on an ad-hoc basis until the move has been completed Maintain Nessus vulnerabilitymanagement, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from More ❯
Peterborough, Cambridgeshire, England, United Kingdom
INTEC SELECT LIMITED
opportunity has arisen with a global brand for a Security Analyst/SOC Analyst on a 6-month Contract basis. You’ll play a key role in security operations, vulnerabilitymanagement, compliance auditing, and incident response, ensuring robust security for cloud services across UK data centres. Role and Responsibilities Manage vulnerability assessments using Tenable.io, including triage, exception … tracking, and remediation Handle EDR alert triage (CrowdStrike) and escalate incidents as needed Conduct system audits for ISO 27001 compliance and review pen test/vulnerability scan outputs Perform log analysis, assist with threat hunting, and escalate risks or unusual activity Develop incident reports and track system impacts for analysis and improvement Collaborate with clients on infrastructure hardening and … identify security gaps Support incident response, forensic analysis, and document findings for knowledge sharing Maintain internal guides and playbooks for security operations Skills and Experience Strong understanding of vulnerabilitymanagement (Tenable.io) and EDR platforms (CrowdStrike) Experience with ISO 27001 audits, system audits, and compliance validation Knowledge of SIEM platforms (Elastic SIEM) and log analysis Hands-on experience with More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
/3 days a week) Rate: £465 per day inside IR35 Start Date: ASAP What's the role? This is a technically diverse Security Analyst position covering areas like: Vulnerabilitymanagement (Tenable.io or equivalent) SIEM monitoring (Elastic preferred) and log analysis Incident detection, triage, and escalation (CrowdStrike or similar EDR) Compliance audits (ISO27001, STIGs) Infrastructure hardening and security … playbooks, and security runbooks Who are we looking for? Ideal candidates will bring: At least 2 years' experience in a Security Analyst or SOC-type role Strong understanding of vulnerabilitymanagement, EDR/SIEM alert triage, and incident response Experience with compliance frameworks (ISO 27001, NIST, etc.) A working knowledge of VMware, AD, Windows Server, Linux Comfort handling More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber Security Operations Manager Location: Leeds/England/Remote Contract Type: Contract Duration … in Cybersecurity, Information Technology, or a related field (Master’s preferred). Minimum 5 years of experience in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerabilitymanagement best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g. More ❯
Leatherhead, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
the company's network infrastructure. Key Responsibilities: Network & Security Monitoring: Perform daily monitoring of network infrastructure and cyber security systems to prevent unplanned downtime, security breaches, or vulnerabilities. Network Management: Develop, maintain, and support the organization's network, including managing Layer 2/3 devices, LAN/WAN, B2B connections, remote access, load balancing, Wi-Fi, and network performance … tools. IT Security Management: Manage IT security systems, including next-generation firewalls, IPS, SIEM tools, endpoint security, and other devices/services. Respond to and analyze security incidents, deploying patches and mitigating vulnerabilities promptly. Security Incident Response: Identify and respond to external and internal threats, investigate security incidents, and implement necessary fixes. Project Collaboration: Work on cyber security projects … particularly those requiring security input, including the rollout of new security measures across the organization. Tool & Software Management: Install and manage firewall and data encryption software to protect sensitive business information. Risk Assessment: Continuously assess risks and report to management to support informed decision-making on cyber security matters. Incident & Service Management: Manage and resolve incidents or More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity management and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerabilitymanagement, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
SC CLEARED*** Vulnerability Manager 6 Month contract initially Location: Barrow-in-Furness. Hybrid, 40% Remote 60% Office Rate: £500 - £550 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a … difference. We have a great opportunity for a Vulnerability Manager to join the team. We are seeking a VulnerabilityManagement Lead with proven experience to join our cybersecurity team. Key Responsibilities: * Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on closure of remediation activities. * Organise, Scope and Facilitate ITHC Regression … with the client's third-party Pen Testing partners to understand and manage the findings of their testing * Identify remediation dependencies and establish remediation prioritisation plans. * Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. * Create relevant risk acceptance reports where remediation is not possible in the More ❯
Infrastructure Engineer Location: London (4 days a week onsite) | Type: Contract | Our client is seeking an experienced Infrastructure Engineer with stong vunerability management experience to join their dynamic IT team. This is a fantastic opportunity to play a key role in strengthening the organisation’s cyber resilience and ensuring a secure, compliant IT environment. Key Responsibilities: Automate patch management … network equipment using tools like SCCM, Intune, and ManageEngine. Analyse vulnerabilities from Tenable scans, determine effective remediation strategies, and implement solutions. Lead the technical implementation of a new patch management platform and drive resolution of vulnerabilities outside SLA. Prepare risk acceptance submissions when direct fixes are not feasible. Skills & Experience Required: Hands-on experience patching and hardening IT systems … including configuration-level vulnerability remediation. Strong knowledge of Microsoft technologies including Windows Server, SQL Server, Windows 10, Microsoft 365, and Azure. Experience managing GPOs, Azure Policies, and various patch management tools (e.g., SCCM, Intune, Ivanti). Familiarity with scripting, vulnerabilitymanagement, and security tooling. ITIL Foundation certification, degree in Computer Science, and financial services experience are More ❯
issues to non-technical stakeholders Exposure to security architecture frameworks (e.g., TOGAF, SABSA) Hands-on experience with CI/CD security, container security, or secure application design Familiarity with vulnerabilitymanagement and threat modelling techniques Security certifications such as CISSP, CISA, or equivalent (or working towards) Why join us Career coaching, mentoring and access to upskilling throughout your More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
Someone With: Expert-level SIEM experience (Azure Sentinel highly preferred) Strong knowledge of Kusto Query Language (KQL) Demonstrated experience in cybersecurity incident response & breach handling Familiarity with threat intelligence, vulnerabilitymanagement , and cloud security tools Proactive mindset with ability to work independently in high-pressure environments Active SC Clearance Ready to make an impact? Apply today to be More ❯
Barrow-in-furness, Cumbria, United Kingdom Hybrid / WFH Options
Experis
Role Title: Vulnerability Manager Duration: 6 month contract from start Location: Barrow-in-Furness, Hybrid, 3 days per week onsite Rate: up to 515.20 p/d Umbrella inside IR35 Clearance : Must Have Active SC Clearance And Be A Sole Uk National Key Skills/requirements Are you passionate about cybersecurity? Are you an excellent communicator with demonstrable experience … organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyber threats? We are seeking a VulnerabilityManagement Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on … with the client's third-party Pen Testing partners to understand and manage the findings of their testing Identify remediation dependencies and establish remediation prioritisation plans. Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. Create relevant risk acceptance reports where remediation is not possible in the More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
Experis
Role Title: Vulnerability Manager Duration: 6 month contract from start Location: Barrow-in-Furness, Hybrid, 3 days per week onsite Rate: up to £515.20 p/d Umbrella inside IR35 Clearance : Must Have Active SC Clearance And Be A Sole Uk National Key Skills/requirements Are you passionate about cybersecurity? Are you an excellent communicator with demonstrable experience … organisations? Would you relish putting these skills into practice by taking on a role within us to protect us and our clients from cyber threats? We are seeking a VulnerabilityManagement Lead with proven experience to join our cybersecurity team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on … with the client's third-party Pen Testing partners to understand and manage the findings of their testing Identify remediation dependencies and establish remediation prioritisation plans. Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. Create relevant risk acceptance reports where remediation is not possible in the More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and remediation … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: Very strong experience in providing technical support and advice for a Security Operations Centre Demonstrate More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
embed security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incident response and vulnerabilitymanagement processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security frameworks (e.g., NIST, CIS … ISO 27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identity and access management, and network security. Excellent stakeholder engagement and documentation skills. If intrested please apply with the most up to date CV More ❯
and implementing cloud-based architectures (AWS, Azure or GCP) Ability to implement monitoring solutions (e.g. Prometheus, Grafana) Experience implementing security best practices in DevOps Processes (e.g. Infrastructure as code, vulnerabilitymanagement and compliance) Aptitude to work in Agile environments Strong communication skills Nice to have: Immediate availability Flexibility to travel onsite if needed If you're interested in More ❯
Alto CSPM is a MUST!. Drive design decision in threat modelling working with STRIDE and MITRE ATT&CK. Strong understanding of cloud security principles, including IAM, Network Security, Vulnerabilitymanagement and threat detection. Experience with container security and Kubernetes would be a advantage. A full brief on the client and job is available, please send CV and More ❯
In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in securing Containerised environments Strong knowledge of vulnerabilitymanagement tools and methodologies. Experience implementing automated deployments DevSecOps Engineer More ❯
SDLC) practices. Advise and offer guidance on: * Design, implement, and maintaining secure CI/CD pipelines.* Integrate security tools and practices into DevOps workflows (e.g., SAST, DAST, SCA, secrets management).* Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices.* Advise on threat modeling, risk assessments, and vulnerability management.* Provide expert More ❯